A New Protocol for Lightweight Anonymous Authentication with Leading Security in Wireless Sensor Networks Based on IoT
Subject Areas : Multimedia Processing, Communications Systems, Intelligent SystemsMaryam Rajabzadeh Asaar 1 , Pouya Derakhshan Barjoei 2 *
1 - Assistant Professor, Department of Electrical and Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran.
2 - Assistant Professor, Department of Electrical and Computer Engineering, Naein Branch, Islamic Azad University, Naein, Iran
Keywords: Internet of things, authentication, anonymity, advanced security, lightweight,
Abstract :
Abstract: Due to the fact that this research was aimed at providing a lightweight protocol, therefore, by checking and analyzing, we will show that the protocol proposed in this research is superior to the protocols of Fotuhi and colleagues in some aspects of security and computing. The proposed protocol will be reviewed and shown, as claimed. It was found that the proposed protocol has both the characteristic of being lightweight and the characteristic of advanced security. By analyzing the security of the protocol, we showed that their proposed protocol is resistant to malicious port and asynchrony attacks.
Introduction: The Internet of Things includes an interconnected network that enables various types of communication and plays a critical role in the development of smart services to support and improve the activities of individuals and society. One of the most important concerns of those who use wireless networks is access information through the public channel considering security and privacy. Authentication is therefore important so that no entity, person, or non-virtual device can abuse the network and by maintaining the privacy of users who are using the network. Important information does not reach these people.
Method: We presented a protocol that, in addition to the mentioned features, it also has the feature of two-way authentication. The proposed protocol model consists of three main components which all three entities have already been approved at the registration stage and can communicate with each other to verify their identity. The overall goal is for both the user and the sensor to verify each other's authorization, which is verified by the gateway. This protocol is safe against attacks and finally compared the proposed protocol with the previous and based protocol.
Results: our outcomes from the proposed method showed that the proposed protocol is 24% in computing overhead and 26% Improves telecommunication overhead.
Discussion: In this research, an attempt was made to provide a protocol that would bring sufficient security requirements without the use of a smart card. Also, unauthorized users cannot access the protocol stages by ways such as repetition attacks, identity forgery, lack of synchronization between the sensor and the user, the ability to track and capture the sensor.
[1] Fotouhi, M., Bayat, M., Das, A. K., Far, H. A. N., Pournaghi, S. M., & Doostari, M. A. (2020). A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Computer Networks, 177, 107333.
[2] Porambage، P.، Schmitt، C.، Kumar، P.، Gurtov، A.، & Ylianttila، M. (2014). PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications. International Journal of Distributed Sensor Networks، 10(7) 357430
[3] Gope، P.، & Hwang، T. (2016). A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Transactions on industrial electronics، 63(11)، 7124-7132.
[4] Ghani، A.، Mansoor، K.، Mehmood، S.، Chaudhry، S. A.، Rahman، A. U.، & Najmus Saqib، M. (2019). Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key. International Journal of Communication Systems، 32(16)، e4139.
[5] Khemissa، H.، Tandjaoui، D.، & Bouzefrane، S. (2017، June). An ultra-lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things. In International conference on mobile، secure، and programmable networking (pp. 49-62). Springer، Cham
[6] abbasi, N., & Karimi, S. (2022). Dynamic Migration of SDN-based Switches to Distribute Control Layer Load and Increase Efficiency Using Ryu Controller. Intelligent Multimedia Processing and Communication Systems (IMPCS), 3(4), 15-27.
[7] Zand, M., & Tahghighi Sharabian, M. (2020). Improvement of IOT Security in ZigBee Network Using AES256 Algorithm. Intelligent Multimedia Processing and Communication Systems (IMPCS), 1(2), 51-59.
[8] Mousavi, S.H., Safaeian, M., Ahmadi G.,A.H. (2022). A New Method in the Security of Encryption Systems by Unbalanced Gates. . Intelligent Multimedia Processing and Communication Systems (IMPCS), 3(2),39-50.
[9] Derakhshan P., G. Dadashzadeh, F. Razzazi,S. M. Razavizadeh. (2011) .Minimum power transmission design for cognitive radio networks in non-stationary environment. IEICE Journal Electronic Exp., Vol.8, No. 3.
[10] Derakhshan P., G. Dadashzadeh, F. Razzazi,S. M. Razavizadeh. (2011). Bio-inspired distributed beamforming for cognitive radio networks in non-stationary environment. IEICE Journal Electronic Exp., Vol.8, No. 6.
[11] Derakhshan P. (2011). Modified Spectrum Sensing and Awareness in Wireless Radio Networks,” Int. Review on Modeling and Simulations, I.RE.MO.S. Journal, pp. 718-722, Vol. 4. No. 2.
[12] Derakhshan P., G. Dadashzadeh, F. Razzazi,S. M. Razavizadeh. (2013). Power and Time Slot Allocation in Cognitive Relay Networks Using Particle Swarm Optimization. Hindawi Journal.
[13] Farash، M. S.، Turkanović، M.، Kumari، S.، & Hölbl، M. (2016). An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Networks، 36، 152-176.
[14] Turkanović، M.، Brumen، B.، & Hölbl، M. (2014). A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks، based on the Internet of Things notion. Ad Hoc Networks، 20، 96-112
[15] Bonyadi A., Rajabzadeh Asaar M., Derakhshan B. P.(2023). Security Analysis of a Lightweight Multifactor Authentication Scheme for Internet of Things Applications, 19th Conf. Inf. Tech. Compt. Comm. ITCT, June.